CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

December 28, 2022

Log4Shell remains a big threat and a common cause for security breaches

Log4Shell is likely to remain a favored vulnerability to exploit as organizations lack visibility into their software supply chains. Read more ▶

Image: The top 12 tech stories of 2022

The top 12 tech stories of 2022

The year highlighted how vulnerable the technology sector is to the vagaries of geopolitics and the macroeconomy, as IT giants laid off workers, regulators cracked down on tech rule-breakers, nations negotiated data security regulations, the US-China chip war widened, and the Ukraine war disrupted business as usual.

4 reasons why CISOs can’t ignore climate change

Climate change is causing disruptions to the supply chain and critical services, and attackers are keen to take advantage of it.

8 tips to secure printers on your network

Printers are essentially computers attached to your network and should be protected accordingly. Here's how.

Image: Multi-factor authentication fatigue attacks are on the rise: How to defend against them

Multi-factor authentication fatigue attacks are on the rise: How to defend against them

LAPSUS$ is just one cybercriminal group that has breached networks of large companies such as Uber and Microsoft by spamming employees with MFA authentication requests.

12 steps to building a top-notch vulnerability management program

Security experts share their best advice for the essential ingredients of a solid vulnerability management program, including foundational elements to put in place, workflows to establish, who to involve, and metrics to track.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494